On Mar 6, 2009, at 6:09 AM, Dan wrote:

> As for its application here... hacking OS X is
> an act of creating a derivative work, done by decoding part of the
> copyrighted OS.

Not true of the so-called "vanilla" installs, which utilize a  
"retail" DVD with absolutely NO changes to the MacOS modules themselves.



> That there decoding is illegal.

Apple believes its encrypted kernel means that ANY decryption of same  
is a violation.

But, Apple's encryption algorithm was disclosed to its developers,  
and it is a very simple algorithm.

Early OSX86 installers DID make use of prior knowledge of Apple's  
decrypter. These instances are generally identified as "dsmos.kext".  
"Dsmos" is generally taken to mean "Dont Steal MacOS".

However, an "open source" decrypter, one which in NO WAY uses any  
prior knowledge of Apple's decrypter code has been developed, and  
this decrypter is now part of many OSX86 installation kits. These  
instances are generally identified as "AppleDecrypt.kext". This is  
NOT an Apple module, not withstanding the inclusion of "Apple" in its  
file name.



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed Low End Mac's G3-5 List, a 
group for those using G3, G4, and G5 desktop Macs - with a particular focus on 
Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to g3-5-list@googlegroups.com
To unsubscribe from this group, send email to 
g3-5-list-unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/g3-5-list?hl=en
Low End Mac RSS feed at feed://lowendmac.com/feed.xml
-~----------~----~----~----~------~----~------~--~---

Reply via email to